{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T05:48:00Z","timestamp":1773294480733,"version":"3.50.1"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030004187","type":"print"},{"value":"9783030004194","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00419-4_3","type":"book-chapter","created":{"date-parts":[[2018,9,5]],"date-time":"2018-09-05T01:35:09Z","timestamp":1536111309000},"page":"35-50","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["The Threat of SSL\/TLS Stripping to Online Voting"],"prefix":"10.1007","author":[{"given":"Anthony","family":"Cardillo","sequence":"first","affiliation":[]},{"given":"Aleksander","family":"Essex","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,6]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Adrian, D., et al.: Imperfect forward secrecy: how Diffie-Hellman fails in practice. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 5\u201317. ACM (2015)","DOI":"10.1145\/2810103.2813707"},{"key":"3_CR2","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.ijhcs.2015.05.005","volume":"82","author":"M Alsharnouby","year":"2015","unstructured":"Alsharnouby, M., Alaca, F., Chiasson, S.: Why phishing still works: user strategies for combating phishing attacks. Int. J. Hum.-Comput. Stud. 82, 69\u201382 (2015)","journal-title":"Int. J. Hum.-Comput. Stud."},{"issue":"5","key":"3_CR3","doi-asserted-by":"publisher","first-page":"889","DOI":"10.1109\/TMC.2013.90","volume":"14","author":"C Amrutkar","year":"2015","unstructured":"Amrutkar, C., Traynor, P., Van Oorschot, P.C.: An empirical evaluation of security indicators in mobile web browsers. IEEE Trans. Mob. Comput. 14(5), 889\u2013903 (2015)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Clark, J., van Oorschot, P.C.: SoK: SSL and HTTPS: revisiting past challenges and evaluating certificate trust model enhancements. In: 2013 IEEE Symposium on Security and Privacy (SP), pp. 511-525. IEEE (2013)","DOI":"10.1109\/SP.2013.41"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-319-68687-5_8","volume-title":"Electronic Voting","author":"C Culnane","year":"2017","unstructured":"Culnane, C., Eldridge, M., Essex, A., Teague, V.: Trust implications of DDoS protection in online elections. In: Krimmer, R., Volkamer, M., Braun Binder, N., Kersting, N., Pereira, O., Sch\u00fcrmann, C. (eds.) E-Vote-ID 2017. LNCS, vol. 10615, pp. 127\u2013145. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-68687-5_8"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 581\u2013590. ACM (2006)","DOI":"10.1145\/1124772.1124861"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Dorey, K., Chang-Fong, N., Essex, A.: Indiscreet logs: Diffie-Hellman backdoors in TLS. In: Proceedings of the 24th Annual Network and Distributed System Security Symposium (NDSS 2017). The Internet Society (2017)","DOI":"10.14722\/ndss.2017.23006"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Durumeric, Z., et al.: The matter of heartbleed. In: Proceedings of the 2014 Conference on Internet Measurement Conference, pp. 475\u2013488. ACM (2014)","DOI":"10.1145\/2663716.2663755"},{"key":"3_CR9","unstructured":"Dzieduszycka-Suinat, S., et al.: The future of voting: end-to-end verifiable internet voting - specification and feasibility study. US Vote Foundation (2015)"},{"issue":"3","key":"3_CR10","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MSP.2017.69","volume":"15","author":"A Essex","year":"2017","unstructured":"Essex, A.: Detecting the detectable: unintended consequences of cryptographic election verification. IEEE Secur. Priv. 15(3), 30\u201338 (2017)","journal-title":"IEEE Secur. Priv."},{"key":"3_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-319-30806-7_8","volume-title":"Engineering Secure Software and Systems","author":"B Fogel","year":"2016","unstructured":"Fogel, B., Farmer, S., Alkofahi, H., Skjellum, A., Hafiz, M.: POODLEs, more POODLEs, FREAK attacks too: how server administrators responded to three serious web vulnerabilities. In: Caballero, J., Bodden, E., Athanasopoulos, E. (eds.) ESSoS 2016. LNCS, vol. 9639, pp. 122\u2013137. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-30806-7_8"},{"key":"3_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-319-22270-7_3","volume-title":"E-Voting and Identity","author":"JA Halderman","year":"2015","unstructured":"Halderman, J.A., Teague, V.: The New South Wales iVote system: security failures and verification flaws in a live online election. In: Haenni, R., Koenig, R.E., Wikstr\u00f6m, D. (eds.) VOTELID 2015. LNCS, vol. 9269, pp. 35\u201353. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-22270-7_3"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Hodges, J., Jackson, C., Barth, A.: HTTP strict transport security (HSTS), RFC 6797 (2012)","DOI":"10.17487\/rfc6797"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Kranch, M., Bonneau, J.: Upgrading HTTPS in mid-air: an empirical study of strict transport security and key pinning. In: NDSS (2015)","DOI":"10.14722\/ndss.2015.23162"},{"key":"3_CR15","unstructured":"Marlinspike, M.: More tricks for defeating SSL in practice. Black Hat USA (2009)"},{"key":"3_CR16","unstructured":"Moher, E., Clark, J., Essex, A.: Diffusion of voter responsibility: potential failings in E2E voter receipt checking. USENIX J. Election Syst. Technol. (2015)"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Nemec, M., Sys, M., Svenda, P., Klinec, D., Matyas, V.: The return of coppersmith\u2019s attack: practical factorization of widely used RSA moduli. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1631\u20131648. ACM (2017)","DOI":"10.1145\/3133956.3133969"},{"key":"3_CR18","unstructured":"Rescorla, E.: The transport layer security (TLS) protocol version 1.2, RFC 5246 (2008)"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Rescorla, E.: The transport layer security (TLS) protocol version 1.3 (draft 28) (2018)","DOI":"10.17487\/RFC8446"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Sheffer, Y., Holz, R., Saint-Andre, P.: Summarizing known attacks on transport layer security (TLS) and datagram TLS (DTLS). RFC 7457 (2015)","DOI":"10.17487\/rfc7457"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Springall, D., et al.: Security analysis of the Estonian internet voting system. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 703\u2013715. ACM (2014)","DOI":"10.1145\/2660267.2660315"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Valenta, L., et al.: Measuring small subgroup attacks against Diffie-Hellman (eprint). In: Proceedings of the 24th Annual Network and Distributed System Security Symposium (NDSS 2017). The Internet Society (2017)","DOI":"10.14722\/ndss.2017.23171"},{"key":"3_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/978-3-662-54970-4_19","volume-title":"Financial Cryptography and Data Security","author":"L Valenta","year":"2017","unstructured":"Valenta, L., Cohney, S., Liao, A., Fried, J., Bodduluri, S., Heninger, N.: Factoring as a service. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 321\u2013338. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-54970-4_19"},{"key":"3_CR24","unstructured":"Western Australian Electoral Commission: 2017 State General Election Election Report (2017)"},{"key":"3_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/978-3-642-38980-1_28","volume-title":"Applied Cryptography and Network Security","author":"F Zag\u00f3rski","year":"2013","unstructured":"Zag\u00f3rski, F., Carback, R.T., Chaum, D., Clark, J., Essex, A., Vora, P.L.: Remotegrity: design and use of an end-to-end verifiable remote voting system. In: Jacobson, M., Locasto, M., Mohassel, P., Safavi-Naini, R. (eds.) ACNS 2013. LNCS, vol. 7954, pp. 441\u2013457. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38980-1_28"}],"container-title":["Lecture Notes in Computer Science","Electronic Voting"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00419-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T12:54:45Z","timestamp":1571835285000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00419-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030004187","9783030004194"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00419-4_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}